GB2610344A - Secure chip identification using resistive processing unit as a physically unclonable function - Google Patents
Secure chip identification using resistive processing unit as a physically unclonable function Download PDFInfo
- Publication number
- GB2610344A GB2610344A GB2217559.0A GB202217559A GB2610344A GB 2610344 A GB2610344 A GB 2610344A GB 202217559 A GB202217559 A GB 202217559A GB 2610344 A GB2610344 A GB 2610344A
- Authority
- GB
- United Kingdom
- Prior art keywords
- values
- midrange
- rpus
- condition
- high values
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C13/00—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
- G11C13/0002—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
- G11C13/0021—Auxiliary circuits
- G11C13/0059—Security or protection circuits or methods
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C13/00—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
- G11C13/0002—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
- G11C13/0021—Auxiliary circuits
- G11C13/004—Reading or sensing circuits or methods
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C13/00—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
- G11C13/0002—Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
- G11C13/0021—Auxiliary circuits
- G11C13/0064—Verifying circuits or methods
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C8/00—Arrangements for selecting an address in a digital store
- G11C8/20—Address safety or protection circuits, i.e. arrangements for preventing unauthorized or accidental access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C2029/4402—Internal storage of test result, quality data, chip identification, repair information
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/50—Marginal testing, e.g. race, voltage or current testing
- G11C2029/5002—Characteristic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Storage Device Security (AREA)
- Design And Manufacture Of Integrated Circuits (AREA)
- Semiconductor Integrated Circuits (AREA)
- Non-Adjustable Resistors (AREA)
- Saccharide Compounds (AREA)
- Logic Circuits (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A technique relates to biasing, using a control system (220), a crossbar array (100) of resistive processing units (102) under a midrange condition, the midrange condition causing resistances of the resistive processing units (102) to result in a random output of low values and high values in about equal proportions. The control system (220) reinforces the low values and the high values of the random output by setting the resistances of the resistive processing units (102) to a state that forces the low values and the high values having resulted from the midrange condition. Reinforcing the low values and the high values makes the random output permanent even when the crossbar array (100) of the resistive processing units (102) is not biased under the midrange condition. The control system (220) records a sequence of the low values and the high values of the random output responsive to reinforcing the low values and the high values of the random output.
Claims (20)
1. A computer-implemented method for identification, the computer-implemented method comprising: biasing, using a control system, a crossbar array of resistive processing units (RPUs) under a midrange condition, the midrange condition causing resistances of the RPUs to result in a random output of low values and high values in about equal proportions; reinforcing, using the control system, the low values and the high values of the random output by setting the resistances of the RPUs to a state that forces the low values and the high values having resulted from the midrange condition, reinforcing the low values and the high values making the random output permanent even when the crossbar array of the RPUs is not biased under the midrange condition; and recording, using the control system, a sequence of the low values and the high values of the random output responsive to reinforcing the low values and the high values of the random output.
2. The computer-implemented method of claim 1, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response.
3. The computer-implemented method of claim 1, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response of the low values and the high values in the about equal proportions.
4. The computer-implemented method of claim 1, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses under the midrange condition that drive the resistances of the RPUs.
5. The computer-implemented method of claim 1, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses to shift resistance values up and down to ensure the low values and the high values in the about equal proportions.
6. The computer-implemented method of claim 1, wherein the crossbar array of the RPUs is configured to be authenticated by reading out a verification sequence that matches the random output, the verification sequence being read out under a different condition than the midrange condition.
7. The computer-implemented method of claim 1 further comprising preventing the resistances of the RPUs from being subsequently programmed, responsive to recording the sequence of the low values and the high values of the random output.
8. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform operations comprising: biasing a crossbar array of resistive processing units (RPUs) under a midrange condition, the midrange condition causing resistances of the RPUs to result in a random output of low values and high values in about equal proportions; reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to a state that forces the low values and the high values having resulted from the midrange condition, reinforcing the low values and the high values making the random output permanent even when the crossbar array of the RPUs is not biased under the midrange condition; and recording a sequence of the low values and the high values of the random output responsive to reinforcing the low values and the high values of the random output.
9. The computer program product of claim 8, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response.
10. The computer program product of claim 8, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response of the low values and the high values in the about equal proportions.
11. The computer program product of claim 8, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses under the midrange condition that drive the resistances of the RPUs.
12. The computer program product of claim 8, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses to shift resistance values up and down to ensure the low values and the high values in the about equal proportions.
13. The computer program product of claim 8, wherein the crossbar array of the RPUs is configured to be authenticated by reading out a verification sequence that matches the random output, the verification sequence being read out under a different condition than the midrange condition.
14. The computer program product of claim 8 further comprising preventing the resistances of the RPUs from being subsequently programmed, responsive to recording the sequence of the low values and the high values of the random output.
15. A system comprising: a memory having computer readable instructions; and one or more processors for executing the computer readable instructions, the computer readable instructions controlling the one or more processors to perform operations comprising: biasing a crossbar array of resistive processing units (RPUs) under a midrange condition, the midrange condition causing resistances of the RPUs to result in a random output of low values and high values in about equal proportions; reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to a state that forces the low values and the high values having resulted from the midrange condition, reinforcing the low values and the high values making the random output permanent even when the crossbar array of the RPUs is not biased under the midrange condition; and recording a sequence of the low values and the high values of the random output responsive to reinforcing the low values and the high values of the random output.
16. The system of claim 15, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response.
17. The system of claim 15, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response of the low values and the high values in the about equal proportions.
18. The system of claim 15, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses under the midrange condition that drive the resistances of the RPUs.
19. The system of claim 15, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses to shift resistance values up and down to ensure the low values and the high values in the about equal proportions.
20. The system of claim 15, wherein the crossbar array of the RPUs is configured to be authenticated by reading out a verification sequence that matches the random output, the verification sequence being read out under a different condition than the midrange condition.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/862,663 US11501023B2 (en) | 2020-04-30 | 2020-04-30 | Secure chip identification using resistive processing unit as a physically unclonable function |
| PCT/IB2021/052314 WO2021220071A1 (en) | 2020-04-30 | 2021-03-19 | Secure chip identification using resistive processing unit as a physically unclonable function |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| GB202217559D0 GB202217559D0 (en) | 2023-01-11 |
| GB2610344A true GB2610344A (en) | 2023-03-01 |
| GB2610344B GB2610344B (en) | 2025-01-15 |
Family
ID=78292966
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB2217559.0A Active GB2610344B (en) | 2020-04-30 | 2021-03-19 | Secure chip identification using resistive processing unit as a physically unclonable function |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US11501023B2 (en) |
| JP (1) | JP7553201B2 (en) |
| CN (1) | CN115191030B (en) |
| AU (1) | AU2021264045B2 (en) |
| DE (1) | DE112021000582T5 (en) |
| GB (1) | GB2610344B (en) |
| IL (1) | IL296249B2 (en) |
| WO (1) | WO2021220071A1 (en) |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11240047B2 (en) | 2019-12-16 | 2022-02-01 | Analog Devices International Unlimited Company | Capacitor based physical unclonable function |
| US11734459B2 (en) * | 2020-08-05 | 2023-08-22 | Analog Devices International Unlimited Company | Monitoring a physical unclonable function |
| US11394566B2 (en) | 2020-08-05 | 2022-07-19 | Analog Devices International Unlimited Company | Physical unclonable function configuration and readout |
| US11837281B2 (en) | 2021-08-31 | 2023-12-05 | Integrated Circuit, Interface Circuit And Method | Integrated circuit, interface circuit and method |
| US12099616B2 (en) * | 2021-11-15 | 2024-09-24 | International Business Machines Corporation | Physically unclonable function based on a phase change material array |
| US11864474B2 (en) | 2022-03-17 | 2024-01-02 | International Business Machines Corporation | ReRAM analog PUF using filament location |
| US11967372B2 (en) * | 2022-03-22 | 2024-04-23 | Micron Technology, Inc. | Shared decoder architecture for three-dimensional memory arrays |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104541369A (en) * | 2012-08-10 | 2015-04-22 | 国际商业机器公司 | Robust Physical Unclonability in Device Authentication |
| CN107615285A (en) * | 2015-03-05 | 2018-01-19 | 美国亚德诺半导体公司 | The Verification System and device encrypted including the unclonable function of physics and threshold value |
| US20180075338A1 (en) * | 2016-09-12 | 2018-03-15 | International Business Machines Corporation | Convolutional neural networks using resistive processing unit array |
| CN107924227A (en) * | 2015-10-20 | 2018-04-17 | 国际商业机器公司 | Resistance processing unit |
| US20190325291A1 (en) * | 2018-04-20 | 2019-10-24 | International Business Machines Corporation | Resistive processing unit with multiple weight readers |
| CN110506282A (en) * | 2017-04-14 | 2019-11-26 | 国际商业机器公司 | The more new management of RPU array |
| WO2020074996A1 (en) * | 2018-10-11 | 2020-04-16 | International Business Machines Corporation | Alignment techniques to match symmetry point as zero-weight point in analog crosspoint arrays |
Family Cites Families (22)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB201110560D0 (en) | 2011-06-22 | 2011-08-03 | Sonitor Technologies As | Radio communication system |
| JP5689569B2 (en) | 2013-02-01 | 2015-03-25 | パナソニックIpマネジメント株式会社 | Nonvolatile memory device |
| EP2833287B1 (en) * | 2013-07-29 | 2017-07-19 | Nxp B.V. | A puf method using and circuit having an array of bipolar transistors |
| US9343135B2 (en) | 2013-09-09 | 2016-05-17 | Qualcomm Incorporated | Physically unclonable function based on programming voltage of magnetoresistive random-access memory |
| US20150071432A1 (en) * | 2013-09-09 | 2015-03-12 | Qualcomm Incorporated | Physically unclonable function based on resistivity of magnetoresistive random-access memory magnetic tunnel junctions |
| US9806718B2 (en) | 2014-05-05 | 2017-10-31 | Analog Devices, Inc. | Authenticatable device with reconfigurable physical unclonable functions |
| US9946858B2 (en) | 2014-05-05 | 2018-04-17 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
| KR101566949B1 (en) | 2014-06-30 | 2015-11-13 | 한국전자통신연구원 | Reconfigurable physically unclonable function apparatus and operating method thereof |
| US9548113B2 (en) * | 2014-11-21 | 2017-01-17 | Panasonic Intellectual Property Management Co., Ltd. | Tamper-resistant non-volatile memory device |
| US9985791B2 (en) | 2015-08-13 | 2018-05-29 | Arizona Board Of Regents Acting For And On Behalf Of Northern Arizona University | Physically unclonable function generating systems and related methods |
| WO2017105517A1 (en) * | 2015-12-18 | 2017-06-22 | Hewlett Packard Enterprise Development Lp | Memristor crossbar arrays to activate processors |
| US10664745B2 (en) | 2016-06-29 | 2020-05-26 | International Business Machines Corporation | Resistive processing units and neural network training methods |
| US10911229B2 (en) | 2016-08-04 | 2021-02-02 | Macronix International Co., Ltd. | Unchangeable physical unclonable function in non-volatile memory |
| US10469271B2 (en) | 2016-08-04 | 2019-11-05 | Macronix International Co., Ltd. | Physical unclonable function for non-volatile memory |
| US9997244B1 (en) | 2016-11-29 | 2018-06-12 | Taiwan Semiconductor Manufacturing Co., Ltd. | RRAM-based authentication circuit |
| US10708041B2 (en) * | 2017-04-30 | 2020-07-07 | Technion Research & Development Foundation Limited | Memresistive security hash function |
| US10103895B1 (en) * | 2017-10-13 | 2018-10-16 | Macronix International Co., Ltd. | Method for physically unclonable function-identification generation and apparatus of the same |
| CN111630598B (en) | 2018-01-23 | 2023-04-11 | 新唐科技日本株式会社 | Nonvolatile memory device and writing method thereof |
| US10319439B1 (en) | 2018-05-15 | 2019-06-11 | International Business Machines Corporation | Resistive processing unit weight reading via collection of differential current from first and second memory elements |
| US10560095B2 (en) * | 2018-05-23 | 2020-02-11 | Analog Devices, Inc. | Impedance-based physical unclonable function |
| US11277271B2 (en) * | 2019-07-31 | 2022-03-15 | Nxp Usa, Inc. | SRAM based physically unclonable function and method for generating a PUF response |
| US11240047B2 (en) * | 2019-12-16 | 2022-02-01 | Analog Devices International Unlimited Company | Capacitor based physical unclonable function |
-
2020
- 2020-04-30 US US16/862,663 patent/US11501023B2/en active Active
-
2021
- 2021-03-18 IL IL296249A patent/IL296249B2/en unknown
- 2021-03-19 WO PCT/IB2021/052314 patent/WO2021220071A1/en not_active Ceased
- 2021-03-19 DE DE112021000582.0T patent/DE112021000582T5/en active Pending
- 2021-03-19 CN CN202180017547.0A patent/CN115191030B/en active Active
- 2021-03-19 AU AU2021264045A patent/AU2021264045B2/en active Active
- 2021-03-19 GB GB2217559.0A patent/GB2610344B/en active Active
- 2021-03-19 JP JP2022564204A patent/JP7553201B2/en active Active
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104541369A (en) * | 2012-08-10 | 2015-04-22 | 国际商业机器公司 | Robust Physical Unclonability in Device Authentication |
| CN107615285A (en) * | 2015-03-05 | 2018-01-19 | 美国亚德诺半导体公司 | The Verification System and device encrypted including the unclonable function of physics and threshold value |
| CN107924227A (en) * | 2015-10-20 | 2018-04-17 | 国际商业机器公司 | Resistance processing unit |
| US20180075338A1 (en) * | 2016-09-12 | 2018-03-15 | International Business Machines Corporation | Convolutional neural networks using resistive processing unit array |
| CN110506282A (en) * | 2017-04-14 | 2019-11-26 | 国际商业机器公司 | The more new management of RPU array |
| US20190325291A1 (en) * | 2018-04-20 | 2019-10-24 | International Business Machines Corporation | Resistive processing unit with multiple weight readers |
| WO2020074996A1 (en) * | 2018-10-11 | 2020-04-16 | International Business Machines Corporation | Alignment techniques to match symmetry point as zero-weight point in analog crosspoint arrays |
Also Published As
| Publication number | Publication date |
|---|---|
| DE112021000582T5 (en) | 2022-12-08 |
| AU2021264045B2 (en) | 2024-03-28 |
| CN115191030A (en) | 2022-10-14 |
| JP7553201B2 (en) | 2024-09-18 |
| AU2021264045A1 (en) | 2022-09-22 |
| GB2610344B (en) | 2025-01-15 |
| JP2023523233A (en) | 2023-06-02 |
| IL296249B1 (en) | 2025-04-01 |
| WO2021220071A1 (en) | 2021-11-04 |
| US20210342489A1 (en) | 2021-11-04 |
| IL296249A (en) | 2022-11-01 |
| US11501023B2 (en) | 2022-11-15 |
| IL296249B2 (en) | 2025-08-01 |
| CN115191030B (en) | 2023-05-23 |
| GB202217559D0 (en) | 2023-01-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| GB2610344A (en) | Secure chip identification using resistive processing unit as a physically unclonable function | |
| US10885976B2 (en) | Semiconductor memory device including phase change memory device and method of accessing phase change memory device | |
| JP6399523B2 (en) | Method and memory device for protecting the contents of a memory device | |
| CN109686391B (en) | Non-volatile memory device and operating method and non-volatile memory package | |
| US12511232B2 (en) | Trim setting determination on a memory device | |
| EP3210208B1 (en) | Generating a representative logic indicator of grouped memristors | |
| KR20160117713A (en) | Semiconductor apparatus and operating method thereof | |
| US11822794B2 (en) | Memory system and operation method of the memory system | |
| KR20210132723A (en) | Proof of data in memory | |
| KR20210130240A (en) | Validate data stored in memory using cryptographic hashes | |
| TWI606362B (en) | Accessing system and method thereof | |
| TW201511005A (en) | Phase change memory, writing method thereof and reading method thereof | |
| CN113470723A (en) | Read retry test method and device, readable storage medium and electronic equipment | |
| WO2019074500A1 (en) | Memory devices including execution trace buffers | |
| US11380394B2 (en) | Voltage profile for reduction of read disturb in memory cells | |
| CN106158015A (en) | Resistive formula storage arrangement, read/write circuit unit and operational approach thereof | |
| CN111625194B (en) | Data reading method of storage medium, storage system and storage device | |
| EP3610379B1 (en) | Transaction identification | |
| KR20240162948A (en) | Semiconductor devices and semiconductor systems related to row hammer refresh | |
| US10579290B2 (en) | Option code providing circuit and providing method thereof | |
| TW201913670A (en) | Data read method and a non-volatile memory apparatus using the same | |
| CN115707342A (en) | Storage control method and apparatus, storage method and apparatus, electronic device, and medium | |
| CN118072781A (en) | Processing method, device, ferroelectric memory circuit, storage medium and program product | |
| KR20220137963A (en) | Perform program operation based on high voltage pulse to safely erase data | |
| US20170308304A1 (en) | Committing altered metadata to a non-volatile storage device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 746 | Register noted 'licences of right' (sect. 46/1977) |
Effective date: 20250218 |